Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Priyadarshan Ajaykumar Singh's Credentials
- Priyadarshan Ajaykumar Singh's Wallet
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Automation Design & Robotics
- Code Quality, Testing, & Development
- Automation
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Embracing Agile at Scale
- PRINCE2® Project Management Overview (2017 Update)
- Being an Effective Team Member
- Agile Project Planning
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Software Design and Development: Design Patterns & SOLID Principles
- Becoming a Successful Collaborator
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- IIBA® Member
- AWS Cloud Practitioner 2020: Cloud Architecture Design Principles
- AWS Cloud Practitioner 2020: Cloud Deployment & Operation
- AWS Cloud Practitioner 2020: Cloud Security & Compliance
- AWS Cloud Practitioner 2020: Cloud Economics
- AWS Cloud Practitioner 2020: Technology Support Resources
- AWS Cloud Practitioner 2020: Access Management
- AWS Cloud Practitioner 2020: Security Support Resources
- Compute Services
- Introduction to Lambda
- Storage
- AWS SysOps Associate 2021: DNS Name Resolution
- CompTIA Server+: Deploying Cloud PaaS & SaaS
- AWS Developer Associate 2021: Optimization
- Working with Amazon DynamoDB: Getting Started with DynamoDB
- Fundamental Security Concepts
- Social Engineering Threats and Prevention
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- DevOps Security Considerations: DevSecOps Principles
- Incident Tracking & Response
- Risk Analysis: Security Risk Management
- Introduction to AWS Services
- CCSP 2019: Identity & Access Management
- Backup & Recovery: Business Continuity & Disaster Recovery
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Security Program Regulatory Integration
- Cloud Computing Fundamentals: Security
- Cyber Security Audits
- CISSP: Software Development Security
- Encryption & Malware
- Information Security Incident Management Part I
- Establishing Self-confidence for Life
- Ensuring Successful Presentation Delivery
- Information Security Program Development Part I
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Security Software Assessments
- Cloud Security Management: Risk Management
- Planning Security Strategies
- Cultivating Enterprise Agile
- Automated Software Testing
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- SOLID & GRASP
- Need for Design Patterns & the Principles Guiding Design Patterns
- Entry Certificate in Business Analysis™
- Priyadarshan Ajaykumar Singh's Transcript
- Priyadarshan Ajaykumar Singh's Wallet
- About Accredible